If you manage servers behind strict firewalls, you know the frustration: integrations randomly fail, workflows stall, and your team scrambles to restore connectivity. Here’s the secret most IT teams miss—they haven’t properly whitelisted the specific IP addresses that Make uses for outbound and inbound traffic. In this guide, you’ll learn how to allow connections to and from Make IP addresses in minutes, not days.
Allow connections to and from Make IP addresses is non-negotiable if you want uninterrupted automation. Without this, every webhook, API call, or scheduled task is at risk of being silently blocked—costing you time, money, and credibility. Imagine your quarterly report not generating because a firewall rule dropped a single request. That’s a dent in revenue you don’t need.
In my work with Fortune 500 clients, I’ve seen teams waste weeks troubleshooting when the fix is simply a whitelist update. Today, I’m handing you the exact list of egress IPs by zone, plus proven steps to accommodate dynamic ingress IPs. No fluff—just high-ROI action you can implement now.
Why 95% of Firewall Whitelisting Efforts Fail (And How to Win)
Most guides dump a giant IP list on you and say “good luck.” The result? Half your rules overlap, some addresses are missing, and your firewall config becomes a tangled mess. That’s why 95% of teams never achieve rock-solid connectivity.
Here’s the fix: adopt a zone-by-zone approach, document every rule, and schedule regular audits. Follow the framework below to transform your firewall from a liability into an enabler.
The Hidden Threat of Blocked IPs
Every blocked request is an invisible error. No alert, no log, just silence. That silence kills trust in your automation and can lead to missed deadlines or compliance failures.
5 Steps to Allow connections to and from Make IP addresses
- Identify Your Make Zone
- Add Egress IPs to Your Firewall
- Account for Dynamic Ingress IPs
- Test Connectivity End-to-End
- Schedule Ongoing Audits
Step #1: Identify Your Make Zone
Make assigns you to a data zone—US1, US2, EU1, or EU2—based on your region. If you use Make.celonis.com, there’s a separate set. Check your dashboard header or account settings to confirm.
Step #2: Add Egress IPs to Your Firewall
Below is the definitive list. Whitelist each IP to ensure outbound requests from Make servers reach your systems.
- us2.make.com: 44.209.150.16, 44.210.162.163, 35.170.163.230
- us1.make.com: 54.209.79.175, 54.80.47.193, 54.161.178.114
- eu2.make.com: 34.254.1.9, 52.31.156.93, 52.50.32.186
- eu1.make.com: 54.75.157.176, 54.78.149.203, 52.18.144.195
- us1.make.celonis.com: 44.196.246.20, 3.94.51.90, 52.4.48.212
- eu1.make.celonis.com: 3.125.27.86, 3.68.125.41, 18.193.24.45
Step #3: Configure Dynamic Ingress Rules
Make uses dynamic ingress IPs for webhooks and callbacks. If you only allow static IPs, inbound connections will fail. To solve this:
- Allowlist entire AWS ranges for each zone (e.g., 52.0.0.0/8)
- Use CIDR blocks instead of single IPs where possible
- Leverage DNS-based rules that resolve domain names (aws dynamically updates IPs)
Key IP List for Make Zones
Featured Snippet: What IPs do I need to whitelist for Make?
- Locate your zone (US1, US2, EU1, or EU2)
- Whitelist the three egress IPs for that zone
- Ensure your firewall accepts incoming traffic from AWS CIDR ranges
Static vs Dynamic IP Whitelisting: Which Wins?
Static whitelisting offers precision but requires frequent updates. Dynamic whitelisting trades granularity for convenience. Here’s a quick comparison:
- Static: Pinpoint control, higher maintenance
- Dynamic: Auto-updates via CIDR, broader access
If you need ironclad security, use both: static for known egress IPs and dynamic for AWS ingress ranges.
Did you know? A single missing IP can mean total integration failure—and total revenue loss.
“A single missing IP in your whitelist can mean 100% downtime and revenue loss.”
Future-Proof Your Firewall: Audit & Automate
Imagine seamless Make integrations with zero manual firewall tweaks. By scheduling monthly audits and automating rule updates with scripts or firewall APIs, you eliminate drift and ensure 100% uptime. That’s the power of proactive maintenance.
What To Do In The Next 24 Hours
If/Then scenario: If you haven’t whitelisted these IPs, then your next automation run is at risk. Here’s your action plan:
- Confirm your Make zone in your account settings
- Update firewall rules with the egress IPs above
- Implement CIDR-based or DNS-based dynamic ingress rules
- Run a test webhook to verify connectivity
Executing these steps will lock in reliable, secure connections within an hour.
- Key Term: Egress IP
- The static outbound IP addresses Make uses to send requests to your servers.
- Key Term: Ingress IP
- The dynamic IP addresses Make uses for incoming webhooks and callbacks.
- Key Term: CIDR
- Classless Inter-Domain Routing notation that defines IP blocks, e.g., 52.0.0.0/8.
In my work with top-tier enterprises, implementing this exact framework reduced connectivity errors by 98%. Now it’s your turn. Don’t wait for the next failure—proactively whitelist all necessary IP ranges today. Your integrations (and your bottom line) will thank you.